Tony Cheneau escribió:
Hi Marcelo,


 I don't know if when are up to do packet fragmentation in order to
 support more Public Keys or if there is even a need for that.

couldn't parse this one....
I just meant to say: if we want for some usage more that 10 keys, we
might have to handle/use NDP packet fragmentation. NDP packet
fragmentation may be undesired here, but we have may have to state it
explicitly.

i think fragmentation should be avoided.
I woudl preffer sending multiple ND messages than fragment




> mmm, but the point is that if the attacker can drop ONE packet and fake > the error message, it would render send inactive between the nodes for > as long as the information is stored in the cache (Which can be a long > time if the nodes talk to each other frequently) Maybe a node shouldn't store/update a cache when it can't talk to a node.
 Does it serve a purpose ?

but in this case it was able to talk to him and he obtained a reply that contains the error message So, i guess that you are suggesting is that we don't cache the error message when it is not secured... I guess we need to check how send works when dealing with plain ND messages, I understand that SEND always rewrites plain ND, but i don't rememebr how this works when ND has a cached data....
What I wanted to say was: the attacker can drop some ND packet, so he
can virtually drop anything. If he block on NDP packet and send an error
message in order to shutdown a communication, I don't see any difference
(the new attack effects are not worst if we consider that we won't
update any cache upon reception of an untrusted error message).


the difference is that if the receiver caches the error information, it will not retry again, and the attacker will be able to disable send with just dropping one message and forging an error. in other words, the difference is the tiem frame of the impact of the attack. In the current situation, the attacker needs to be intercepting the messages for the whiole duration of the attack, If the attacker leaves the location and stop dropping the packet, the attack is over. In this other situation, if the attacker manages that the reciever caches the error information and makes it beleive that the receiver does not support send, then send will not be used as lomng as the cached information is preserved. Even if the attacker leaves the attack position, the impact of the attack still applies

is this clearer?
> So, this would imply that dropping one packet and generating an error > message (which is unprotected) would deactivate send between two > nodes... right?
 The error message should be protected (so a third party can check the
 message during forensic).
how?
the whole point of the error message it to handle the case that there is no common crypto suite between the two communicating nodes
So, by definition, the receiver cannot validate the error message
The receiver might not, but a third party could. An administrator could
place probes inside his network that will tell him an attack is
undergoing.

agree, for tracing purposes, this is useful

regards, marcelo

 Note that the message could be understood by
the node. If the error message only state something like "you are using too short keys", it wouldn't prevent the receiver to verify the message.

right, in this case i agree
but this opens the door to downgrading attacks though
I mean, would the error would sign by the long key or the short key?
The short key error in this case is caused by the node that will receive
the error. But it is true that it might be difficult  to trust the error
message in some cases.

Regards,
    Tony Cheneau





_______________________________________________
CGA-EXT mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cga-ext

Reply via email to